Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Sylvain Leblanc"'
Autor:
Luke A. Brown, Harry Morris, Sylvain Leblanc, Gabriele Bai, Christian Lanconelli, Nadine Gobron, Courtney Meier, Jadunandan Dash
Publikováno v:
Methods in Ecology and Evolution, Vol 14, Iss 9, Pp 2329-2340 (2023)
Abstract Digital hemispherical photography (DHP) is widely used to derive forest biophysical variables including leaf, plant, and green area index (LAI, PAI and GAI), the fraction of intercepted photosynthetically active radiation (FIPAR), and the fr
Externí odkaz:
https://doaj.org/article/ef0fe1b71fa442afa1a0bcd0fd7e8cd5
Autor:
Sylvain Leblanc, Taylor Perkins
Publikováno v:
National Cyber Emergencies
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c723323f16de60029362e2be2fe28749
https://doi.org/10.4324/9780429343438-11
https://doi.org/10.4324/9780429343438-11
Publikováno v:
National Cyber Emergencies
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a87116b97a19a728d94c7da706ef5965
https://doi.org/10.4324/9780429343438-14
https://doi.org/10.4324/9780429343438-14
Publikováno v:
IEEE Intelligent Systems. 33:54-62
Modern automobiles are controlled by computers that are increasingly connected to the outside world and therefore vulnerable to cyberattacks. Defending cars against such attacks requires a multifaceted approach to improving security, but the last lin
Publikováno v:
MALWARE
Object Management Group’s Data Distribution Service for Real-Time Systems (DDS) middleware standard is a popular technology that forms the core of many mission-critical distributed real-time, data-centric systems, including command and control syst
Autor:
Antoine Lemay, Sylvain Leblanc
Publikováno v:
MALWARE
Client-side attacks have become very popular in recent years. Consequently, third party client software, such as Adobe’s Acrobat Reader, remains a popular vector for infections. In order to support their malicious activities, PDF malware authors of
Autor:
Sylvain Leblanc, Mohammad Zulkernine, Fahim T. Imam, Francisco J. García, Siam Hasan, Thomas R. Dean
Publikováno v:
ECBS
The expressiveness of constraints has a potential to define network behavior and defend against complex network intrusions. This potential can be an integral part of an Intrusion Detection System (IDS) for defending networks against various attacks.
Autor:
Sylvain Leblanc, Winson Ang
Publikováno v:
Journal of The Japan Institute of Marine Engineering. 49:322-331
Publikováno v:
DSAA
Modern automobiles have been proven vulnerable to hacking by security researchers. By exploiting vulnerabilities in the car's external interfaces, such as wifi, bluetooth, and physical connections, they can access a car's controller area network (CAN
Publikováno v:
WCICSS
The modern automobile is controlled by networked computers. The security of these networks was historically of little concern, but researchers have in recent years demonstrated their many vulnerabilities to attack. As part of a defence against these